Sample Essay on:
INFORMATION TECHNOLOGY: SECURITY BY ADMONITION

Here is the synopsis of our sample research paper on INFORMATION TECHNOLOGY: SECURITY BY ADMONITION. Have the paper e-mailed to you 24/7/365.

Essay / Research Paper Abstract

This 3-page paper focuses on the effectiveness of security by admonition. Bibliography lists 3 sources.

Page Count:

3 pages (~225 words per page)

File: D0_MTsecitadm.rtf

Buy This Term Paper »

 

Unformatted sample text from the term paper:

or install. "It," of course, is a little pop-up box, asking a user if he/she wants to download and run software. Or "it" could be a pop-up box warning the user that a particular Internet site hasnt been validated as "Safe." Many times, the user shrugs away annoyances, presses the "yes" button with the mouse, and moves on with the download or browsing activity, unaware that he/she has just encountered a passive security system. This is called security by admonition, and since being built into Microsofts Word for Windows systems during the early 2000s, its meant as a deterrence -- at least, kind of. The concept behind security by admonition is that it makes the user think before pressing that key, giving the user a final out of "are you REALLY sure you want to okay this download?" Its believed that most users are rational and will not willingly invite malicious codes or hackers into their systems. But how does admonition end up becoming an important part of a companys IT security? And is it effective? Admonition: An Overview Miller (2008) points out that the goal of any kind of computer safety, or security, is to allow a networking system to cooperate with its user and what the user wants, while keeping the "bad things" out. He points out there are many given level of risks, and breaks these levels into prevention, deterrence and admonition (Miller, 2008). Prevention provides safety by making danger impossible -- providing assumptions and caveats that need to be explicit for the system to follow (Miller, 2008). The next level is deterrence, and it discourages any type of attack by ensuring that its not in the attackers best interest to ...

Search and Find Your Term Paper On-Line

Can't locate a sample research paper?
Try searching again:

Can't find the perfect research paper? Order a Custom Written Term Paper Now